exam questions

Exam PSE Strata All Questions

View all questions & answers for the PSE Strata exam

Exam PSE Strata topic 1 question 10 discussion

Actual exam question from Palo Alto Networks's PSE Strata
Question #: 10
Topic #: 1
[All PSE Strata Questions]

A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds.
How is this goal accomplished?

  • A. Create a custom spyware signature matching the known signature with the time attribute
  • B. Add a correlation object that tracks the occurrences and triggers above the desired threshold
  • C. Submit a request to Palo Alto Networks to change the behavior at the next update
  • D. Configure the Anti-Spyware profile with the number of rule counts to match the occurrence frequency
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
milkyway2000
9 months, 2 weeks ago
Selected Answer: A
A is correct, checked in lab, what VenomX51 is saying is true.
upvoted 2 times
...
VenomX51
9 months, 3 weeks ago
Selected Answer: A
The answer is A This is exactly how brute force threat ID is triggered. It watches a separate threat ID (failed auth attempt, which is an alert by default), and has a time event that if that monitored threat ID is triggered x times in y seconds by the same source IP, then the brute force threat is triggered, and can then take a different action such as block IP. You would create a custom spyware profile to do the same; trigger when x has occurred y times in z seconds. A correlation object does not trigger anything. It pulls data from multiple sources and can create a log entry when it's defined conditions are met.
upvoted 2 times
...
MaxG
10 months ago
Selected Answer: B
To trigger a known spyware threat signature based on a rate of occurrence (e.g., 10 hits in 5 seconds), you need to add a correlation object that tracks the occurrences and triggers an alert or action when the specified threshold is met. This correlation object monitors the frequency of the spyware signatures and ensures that action is taken only when the threshold is exceeded, providing more granular control over threat detection and response. References: Palo Alto Networks Threat Prevention and Correlation Objects documentation.
upvoted 2 times
...
Jerar
10 months, 4 weeks ago
Selected Answer: A
A is correct, see the link from nobody165456131354
upvoted 1 times
...
Jerar
11 months, 1 week ago
A is correct, see the link from nobody165456131354
upvoted 1 times
...
davidpm
11 months, 2 weeks ago
Selected Answer: B
Correct answer it´s b B. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/monitoring/use-the-automated-correlation-engine/automated-correlation-engine-concepts/correlation-object
upvoted 2 times
...
nobody165456131354
1 year, 6 months ago
https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/create-a-custom-threat-signature/create-a-combination-signature
upvoted 4 times
...
freepotatoes
2 years, 1 month ago
A is corect
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago